Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-12800 PoC — WordPress Drag and Drop Multi File Upload - Contact Form 代码问题漏洞

Source
Associated Vulnerability
Title:WordPress Drag and Drop Multi File Upload - Contact Form 代码问题漏洞 (CVE-2020-12800)
Description:The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
Description
POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload 
Readme
<!-- What doth life???
Wordpress core isn't bad, it's the plugins that cause issues...
blog.amartinsec.com / @amartinsec 
blah -->
# CVE-2020-12800
POC Script for CVE-2020-12800: RCE through Unrestricted File Type Upload 


Vulnerable plugin for testing hosted at:
https://mega.nz/file/aQUClQKC#ZYeiTYSrPuRnwwlRavy4cqf_EXs34Tkq6KQig2RcOas

[Pentester Academy lab](https://attackdefense.com/challengedetailsnoauth?cid=2195)
File Snapshot

[4.0K] /data/pocs/3b5c8e387562f1a8f25b84db0a4244db2b80e76e ├── [5.7K] exploit.py └── [ 423] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →